1. | - Networking First-Step: How to Build a Local (Network) Roadway
- Jun 4, 2004
- Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
|
2. | - New First-Step book Provides an Easy Start to Computer Networking
- May 7, 2004
|
3. | - Interdomain Routing Basics
- Jan 1, 2001
- This chapter covers the following key topics: an overview of routers and routing, routing protocol concepts, and segregating the world into autonomous systems.
|
4. | - Cisco Catalyst SD-WAN Components
- Dec 27, 2024
|
5. | - Configure and Verify Single Area OSPFv2
- Dec 27, 2024
|
6. | - Dashboards
- Dec 27, 2024
|
7. | - Role-Based Access Control (RBAC)
- Dec 27, 2024
|
8. | - Segment Routing for Service Provider and Enterprise Networks
- Dec 27, 2024
|
9. | - First Hop Redundancy Protocols
- By
Wendell Odom, Jason Gooley, David Hucaby
- Aug 5, 2024
First Hop Redundancy Protocols (FHRPs) add the function of redundancy and load sharing for the default router function in any subnet. In this sample chapter you will learn the purpose, functions, and concepts of FHRPs. This chapter covers the following exam objectives from the CCNA 200-301 v1.1 exam: 3.0 IP Connectivity and 3.5 FHRPs.
|
10. | - Implementing Basic OSPF Features
- By
Wendell Odom
- Aug 5, 2024
Configuring OSPF, using mostly default settings for all the optional features, requires only a few commands. Here you will learn how to implement OSPFv2 using network Commands and Interface Subcommands. This sample chapter from CCNA 200-301 Official Cert Guide covers the following CCNA 200-301 v1.1 exam objectives: 3.0 IP Connectivity to 3.4.d Router ID.
|
11. | - Latency, delay, speed test vs. iPerf
- By
Allan Johnson
- Aug 5, 2024
Prepare for your CCST Networking exam in 31 days. Today's review focuses on the different measurements for network performance, the sources of delay, testing network performance online, and testing network performance using the Windows iPerf tool.
|
12. | - pyATS Triggers and Verifications
- By
John Capobianco, Dan Wade
- Aug 5, 2024
The pyATS library (Genie) provides the Genie Harness to execute network tests with dynamic and robust capabilities. The Genie Harness can be daunting for new users of the pyATS library (Genie), as there are many configuration options and parameters. By the end of the chapter, you'll understand the powerful capabilities of Genie Harness and how to write and execute triggers and verifications.
|
13. | - SD-WAN and DMVPN
- By
Dhrumil Prajapati, Jeremy Bowman, Navin Suvarna
- Aug 5, 2024
Learn common design strategies in SD-WAN and DMVPN deployments, and how to design and deploy these two technologies to integrate with other IBN domains, in this sample chapter from Designing Real-World Multi-domain Networks.
|
14. | - The Meraki Admin Experience
- By
Arun Paul, Jeffry Handal, Medi Jaafari, Mike Woolley
- Aug 5, 2024
The Cisco Meraki platform can now be used to manage all digital cloud operations in one single integration. In this sample chapter from Cisco Meraki Fundamentals: Cloud-Managed Operations, you will learn how the Dashboard can help administrators monitor and proactively address potential issues in their day-to-day workflow.
|
15. | - Access Management
- By
Shane Sexton, Raymond Lacoste
- Apr 17, 2024
In this sample chapter from Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, you will learn how to provide an access management solution using the AAA framework, which outlines the best practices you need to consider when it comes to authentication, authorization, and accounting. This chapter covers CCST exam objective 1.3.
|
16. | - Communication Principles
- By
Cisco Networking Academy
- Apr 17, 2024
This Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy. This sample chapter covers the communication protocols for networks as well as network communication standards. You will also learn what the difference is between the OSI and TCP/IP models.
|
17. | - Hacking AI Systems
- By
Omar Santos, Petar Radanliev
- Apr 17, 2024
Learn to identify an AI attack and the potential impacts of data breaches on AI and ML models. Demonstrate real-world knowledge by designing and implementing proactive security measures to protect AI and ML systems from potential attacks.
|
18. | - Impact of AI in Other Emerging Technologies
- By
Omar Santos, Hazim Dahir, Samer Salam
- Apr 17, 2024
This sample chapter explains the complex interplay between AI and four other pivotal domains: quantum computing, blockchain technologies, autonomous vehicles and drones, and edge computing.
|
19. | - Implementing Data Center Overlay Protocols
- By
Somit Maloo, Firas Ahmed, Iskren Nikolov
- Apr 17, 2024
In this sample chapter from CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide, 2nd Edition, you will get an overview of the Virtual Extensible LAN (VXLAN), with coverage of Layer 2 VLAN extension to provide multitenant flexibility, high segment scalability, and Layer 2 spanning tree improvement, along with a configuration example mapped to the exam objectives.
|
20. | - Measuring Zero Trust Success
- By
Avinash Naduvath
- Apr 17, 2024
This sample chapter from In Zero Trust We Trust focuses on helping you craft standard metrics based on key constructs, such as risk and performance, so that you can showcase the value that Zero Trust brings to the enterprise infrastructure, processes, and people.
|